oncord
2024-12-02 18:25:35
(1 week ago)
Form spam
Web Spam
TPI-Abuse
2024-11-28 15:05:35
(1 week ago)
(mod_security) mod_security (id:210730) triggered by 45.67.99.59 (-): 1 in the last 300 secs; Ports: ... show more (mod_security) mod_security (id:210730) triggered by 45.67.99.59 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Thu Nov 28 10:05:28.920997 2024] [security2:error] [pid 23273:tid 23273] [client 45.67.99.59:39565] [client 45.67.99.59] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||pellman-world.com|F|2"] [data ".sql"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "pellman-world.com"] [uri "/bak/www.sql"] [unique_id "Z0iGuEN7kIHjWT63UIAgWAAAABc"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2024-11-26 05:57:32
(2 weeks ago)
(mod_security) mod_security (id:210730) triggered by 45.67.99.59 (-): 1 in the last 300 secs; Ports: ... show more (mod_security) mod_security (id:210730) triggered by 45.67.99.59 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Tue Nov 26 00:57:27.435305 2024] [security2:error] [pid 31338:tid 31338] [client 45.67.99.59:20895] [client 45.67.99.59] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||cryptoedge.net|F|2"] [data ".dat"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "cryptoedge.net"] [uri "/old/wallet.dat"] [unique_id "Z0VjRyi9AzveOMABX5oi0AAAAAo"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2024-11-19 10:15:55
(3 weeks ago)
(mod_security) mod_security (id:210730) triggered by 45.67.99.59 (-): 1 in the last 300 secs; Ports: ... show more (mod_security) mod_security (id:210730) triggered by 45.67.99.59 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Tue Nov 19 05:15:49.608231 2024] [security2:error] [pid 29997:tid 29997] [client 45.67.99.59:1935] [client 45.67.99.59] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||symbarenewables.com|F|2"] [data ".sql"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "symbarenewables.com"] [uri "/backups/www.sql"] [unique_id "ZzxlVX2t209HHe9odrcyBwAAAAo"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2024-11-15 17:54:26
(3 weeks ago)
(mod_security) mod_security (id:210730) triggered by 45.67.99.59 (-): 1 in the last 300 secs; Ports: ... show more (mod_security) mod_security (id:210730) triggered by 45.67.99.59 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Fri Nov 15 12:54:19.637624 2024] [security2:error] [pid 17834:tid 17834] [client 45.67.99.59:47911] [client 45.67.99.59] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||loriatrading.com|F|2"] [data ".sql"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "loriatrading.com"] [uri "/backup/mysql.sql"] [unique_id "ZzeKy2XbRceAW49NB2uc3QAAAAk"] show less
Brute-Force
Bad Web Bot
Web App Attack
oncord
2024-11-13 01:37:23
(4 weeks ago)
Form spam
Web Spam
TPI-Abuse
2024-11-12 08:19:49
(4 weeks ago)
(mod_security) mod_security (id:210492) triggered by 45.67.99.59 (-): 1 in the last 300 secs; Ports: ... show more (mod_security) mod_security (id:210492) triggered by 45.67.99.59 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Tue Nov 12 03:19:43.130174 2024] [security2:error] [pid 3926:tid 3926] [client 45.67.99.59:58385] [client 45.67.99.59] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "/sftp-config.json" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "117"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "bitcoinsquaretrade.com"] [uri "/backup/sftp-config.json"] [unique_id "ZzMPn-e2Hp1jrFKNy-u0tQAAABA"] show less
Brute-Force
Bad Web Bot
Web App Attack
nyuuzyou
2024-11-11 00:03:45
(1 month ago)
Intensive scraping: /web?s=Top%20commercial%20real%20estate%20firms%20in%20California&country=gl-gl& ... show more Intensive scraping: /web?s=Top%20commercial%20real%20estate%20firms%20in%20California&country=gl-gl&scraper=brave. User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 12_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.0.0 Safari/537.36 Edg/114.0.1264.71. show less
Bad Web Bot
oncord
2024-11-10 23:49:27
(1 month ago)
Form spam
Web Spam
TPI-Abuse
2024-11-09 18:33:01
(1 month ago)
(mod_security) mod_security (id:210492) triggered by 45.67.99.59 (-): 1 in the last 300 secs; Ports: ... show more (mod_security) mod_security (id:210492) triggered by 45.67.99.59 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Sat Nov 09 13:32:54.794056 2024] [security2:error] [pid 10726:tid 10726] [client 45.67.99.59:50629] [client 45.67.99.59] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "/sftp-config.json" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "117"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "www.crypto-stamps.com"] [uri "/backups/sftp-config.json"] [unique_id "Zy-q1sPONvJpBiKruoxv6AAAAAA"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2024-11-06 15:07:07
(1 month ago)
(mod_security) mod_security (id:210730) triggered by 45.67.99.59 (-): 1 in the last 300 secs; Ports: ... show more (mod_security) mod_security (id:210730) triggered by 45.67.99.59 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Wed Nov 06 10:07:02.267200 2024] [security2:error] [pid 22750:tid 22750] [client 45.67.99.59:45451] [client 45.67.99.59] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||bitcoinsubscribers.com|F|2"] [data ".sql"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "bitcoinsubscribers.com"] [uri "/old/dump.sql"] [unique_id "ZyuGFs9x7EOYwI-H5u9ZCQAAAAo"] show less
Brute-Force
Bad Web Bot
Web App Attack
TPI-Abuse
2024-11-05 16:20:53
(1 month ago)
(mod_security) mod_security (id:210730) triggered by 45.67.99.59 (-): 1 in the last 300 secs; Ports: ... show more (mod_security) mod_security (id:210730) triggered by 45.67.99.59 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Tue Nov 05 11:20:45.550466 2024] [security2:error] [pid 29647:tid 29647] [client 45.67.99.59:8633] [client 45.67.99.59] ModSecurity: Access denied with code 403 (phase 2). Match of "pmFromFile userdata_wl_extensions" against "TX:extension" required. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/10_HTTP_HTTP.conf"] [line "27"] [id "210730"] [rev "5"] [msg "COMODO WAF: URL file extension is restricted by policy||isitel.com|F|2"] [data ".sql"] [severity "CRITICAL"] [tag "CWAF"] [tag "HTTP"] [hostname "isitel.com"] [uri "/bak/backup.sql"] [unique_id "ZypF3fHKKGHKI1N3yQtjbwAAAAs"] show less
Brute-Force
Bad Web Bot
Web App Attack
Anonymous
2024-10-30 10:47:21
(1 month ago)
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH
TPI-Abuse
2024-10-07 12:11:46
(2 months ago)
(mod_security) mod_security (id:210492) triggered by 45.67.99.59 (-): 1 in the last 300 secs; Ports: ... show more (mod_security) mod_security (id:210492) triggered by 45.67.99.59 (-): 1 in the last 300 secs; Ports: *; Direction: 1; Trigger: LF_MODSEC; Logs: [Mon Oct 07 08:11:42.074935 2024] [security2:error] [pid 12866:tid 12866] [client 45.67.99.59:37809] [client 45.67.99.59] ModSecurity: Access denied with code 403 (phase 1). Matched phrase "/sftp-config.json" at REQUEST_URI. [file "/etc/apache2/conf.d/modsec_vendor_configs/comodo_apache/02_Global_Generic.conf"] [line "117"] [id "210492"] [rev "3"] [severity "CRITICAL"] [tag "CWAF"] [tag "Generic"] [hostname "www.ezsmiledental.com"] [uri "/restore/sftp-config.json"] [unique_id "ZwPP_ulwMIWc4MTZJG1g0gAAAAA"] show less
Brute-Force
Bad Web Bot
Web App Attack
Anonymous
2024-09-06 04:20:27
(3 months ago)
Ports: 80,443; Direction: 0; Trigger: LF_CUSTOMTRIGGER
Brute-Force
SSH